{"title":"Control model for networked embedded applications","authors":"O. Koné","doi":"10.1109/INFTECH.2008.4621601","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621601","url":null,"abstract":"We deal with the problem of safe operation guarantee in networked embedded application by avoiding dysfunctionings caused by unexpected behaviour of connected components. We use a behaviour based control mechanism to fix the desired operations of the application. The paper proposes a generic control model which can be customized for various applications profiles without modifying the underlying network bearer.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133176770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role and construction of educational agents in distance learning environments","authors":"A. Landowska","doi":"10.1109/INFTECH.2008.4621650","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621650","url":null,"abstract":"An educational agent is an intelligent and autonomous part of a learning environment introduced in order to assist a student or a teacher in the completion of their tasks. An agent can also autonomously perform tasks related with the management of learning resources or the achievement of internal educational goals. This paper presents the definition and classification of educational agents together with their tasks and roles in the educational process. In distance learning environment, agents can improve the motivation and concentration of the students and, consequently, they can improve the effectiveness of the educational process. Agent characteristics and architecture required to achieve educational goals are also described. The paper presents also a prototypical implementation of an educational agent (called the WAS agent) that is developed as a part of our research.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information security in the LRIT system","authors":"R. Niski, Marcin Waraksa, J. Zurek","doi":"10.1109/INFTECH.2008.4621700","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621700","url":null,"abstract":"LRIT (long range identification and tracking of ships) system is close to its implementation and the LRIT information (identification and position of the vessels) is very sensitive. In this paper the structure of system data bases and communication links in the LRIT system are presented. In this context, a security of the LRIT information will be analyzed, moreover cryptographic mechanisms in the LRIT links on-land will be described. Network security issues and mechanisms ldquoas isrdquo will not be described here - they are widely described in available literature. As for now there is no any recommendation in the LRIT standard documentation concerning information protection in the LRIT radio links. In the paper a proposal of cryptographic system for the LRIT radio links will be presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128686346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency of new method of removing the noisy background from the sequence of MRI scans depending on structuring elements used to morphological processing","authors":"R. Kalicka, A. Pietrenko‐Dabrowska, S. Lipiński","doi":"10.1109/INFTECH.2008.4621682","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621682","url":null,"abstract":"The paper presents a new method of removing the noisy background from the sequence of magnetic resonance imaging (MRI) scans. The scans contain the noisy head-cross data and also the noisy background data. The latter have to be removed and excluded from a further analysis. It is achieved by applying some basic morphological operations of dilation, erosion, opening and closing to the previously binarized MRI scans. The results of removing the background from the sequence of scans with the use of some different shapes and sizes of structuring elements are presented in the paper. The aim of this paper is to choose the best structuring elements to make the new method the most immune to various qualities and appearances of the processed MRI images.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122453402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How does ethernet work on freescale MPC8555E embedded platform with FreeBSD system?","authors":"P. Kruszynski, S. Sobieski","doi":"10.1109/INFTECH.2008.4621606","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621606","url":null,"abstract":"The main purpose of this paper is to provide the reader with some insight into how Ethernet controller works on MPC8555E embedded platform produced by Freescale company. The paper will deal with the problems connected with Ethernet performance during power-up of computer when firmware is running on the hardware and later when FreeBSD loader works. Another problem which will be described is network controller management that is provided by FreeBSD kernel. The last part will mention some differences between firmware (pooling) and kernel network implementation (interrupt).","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121417757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic content segmentation of audio recordings at multidisciplinary medical team meetings","authors":"Jing Su, B. Kane, S. Luz","doi":"10.1109/INFTECH.2008.4621647","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621647","url":null,"abstract":"A single recording of a multidisciplinary medical team meeting (MDTM) can be expected to contain several separate discussions on different patients. Automatic speaker segmentation alone does not allow for the separation of individual patient case discussions (PCDs). A novel method is presented here, based on Hidden Markov Models (HMM), to segment audio recordings of MDTMs and facilitate the non-linear retrieval of individual PCDs. The method combines professional role interaction with speaker vocalization patterns. The sequence and duration of vocalization and speakerspsila roles are used as training states. Results demonstrate HMM segmentation to have good potential in the development of an MDTM browser. The approach outlined here can be applied in a wide range of meetings.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115062895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic composition of behavior-rich VR content","authors":"K. Walczak","doi":"10.1109/INFTECH.2008.4621653","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621653","url":null,"abstract":"A novel approach to modeling and dynamic composition of behavior-rich interactive VR content is presented. The approach, called Beh-VR, enables dynamic generation of virtual scenes from arbitrarily selected sets of specifically designed reusable virtual objects, called VR-Beans. Presentation and behavior of the objects in virtual scenes is determined by associated scripts encoded in a high-level language called VR-BML. VR-Beans are compatible with existing scene description standards such as VRML/X3D, but are designed according to specific rules enabling the use of these objects in dynamically generated scenes. Further, to simplify the design of complex interactive VR scenes, VR content patterns are used.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115154082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware accelerated implementation of wavelet transform for machine vision in road traffic monitoring system","authors":"M. Kłosowski","doi":"10.1109/INFTECH.2008.4621686","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621686","url":null,"abstract":"A system for road traffic monitoring has been described. This machine vision system is using small and cheap camera and FPGA postprocessor with wireless network interface. Power for the system will be delivered from solar panels and therefore the system is optimized to be power efficient. In this paper the machine vision traffic jam detection module based on wavelet transform is described. This module correctly detects and measures traffic jams or very slow traffic conditions when background subtraction algorithms (used for vehicle counting) are not suitable. Optical flow algorithms can also be used but they are computationally expensive. Sample discrete wavelet transform based algorithm and its hardware implementation in FPGA are examined in the paper. Hardware accelerated discrete wavelet transform can be also applied to image compression when image has to be transferred to the traffic control center (picture quality and frame rate depends on wireless network quality). Results of sample traffic classification are presented and compared. This work has been supported by the Polish Ministry of Science and Higher Education under R&D grant no. R02 014 01 from the Science Budget 2007-2008.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114420378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis and extension of top-k spatial preference queries optimization methods","authors":"M. Gorawski, K. Dowlaszewicz","doi":"10.1109/INFTECH.2008.4621629","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621629","url":null,"abstract":"The paper presents a general overview of top-k spatial preference queries and their R-tree based optimization methods. It also proposes a modification of top-k spatial preference query description and a new optimization technique. Moreover, the paper presents an analysis of query definition influence on the process of its execution using algorithms which utilize different combinations of optimization methods. An analogous analysis of data character influence is also presented.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121545139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data processing in the intOLAP system","authors":"M. Gorawski, S. Bankowski","doi":"10.1109/INFTECH.2008.4621587","DOIUrl":"https://doi.org/10.1109/INFTECH.2008.4621587","url":null,"abstract":"Reporting systems are important part in the software creating and customization process. Presenting information in a form of legible and user-friendly report is a basis for business decisions support. In OLAP systems, these actions have to be performed on-line what results in strict requirements regarding system's reliability and efficiency. The more complex the data warehouse the higher the costs of reports designing and maintaining process. Recently we can observe that data warehouse engine does not fit all clients tools - such problems can be resolved with different platforms integration. The framework presented in the paper supports creation of OLAP class interoperate reporting system with regards of the ETL process.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133646669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}